With use Cobb-Douglas ratio the balance of information resource of telecommunication system was to achieve target function and to ensure the security of information under conditions of additive information technology ...
详细信息
ISBN:
(数字)9781728147727
ISBN:
(纸本)9781728147734
With use Cobb-Douglas ratio the balance of information resource of telecommunication system was to achieve target function and to ensure the security of information under conditions of additive information technology impacts justified. Information conflict of components of the protected system with means of destructive effects is reproduced in the form of implementation of the conflict component in its information area during joint operation. The process of protecting telecommunication system is on changing the private target functions of the components to prevent penetration and implement the conflict component in the information area based. Safe state of the system is by results of maximization of probability of realization of its target function at set parameters of cycles and limitations on control resources determined. An iterative procedure for evaluating the change of the target function of the system and resource consumption for neutralization of the conflict component has been built.
Dynamic routing protocols transmit routing information in a finite time, resulting in errors in determining the optimal packet route. As a consequence, the efficiency of data exchange may deteriorate, for example, inc...
详细信息
ISBN:
(数字)9781728147727
ISBN:
(纸本)9781728147734
Dynamic routing protocols transmit routing information in a finite time, resulting in errors in determining the optimal packet route. As a consequence, the efficiency of data exchange may deteriorate, for example, increasing the time spent on the network packets. The aim of the work is to study the behavior of the network in the case of unpredictable topology changes caused by sudden multiple failures of network equipment. The solution is carried out with the help of a specialized simulation model that allows you to track the change in network parameters in the process of its operation. Simulation showed that equipment failures lead to a qualitatively new network behavior, for the characteristics of which, along with the traditional indicator “packet delivery time”, two characteristics are additionally defined: “the proportion of lost packets” and “the probability of packet looping”. A comparative analysis of several variants of the implementation of routing algorithms using multi-step and one-step metrics is performed and the conditions for choosing the optimal parameters of routing process control are determined. The results of the research allow us to determine the requirements for the speed of transmission of route information, characteristics of route labels and access control parameters depending on the network topology.
In channelized receivers which are used for electronic support systems, when a pulse modulated signal is received, rabbit ear effect occurs at the out of band channels of the channelizer. In this paper rabbit ear prob...
详细信息
In channelized receivers which are used for electronic support systems, when a pulse modulated signal is received, rabbit ear effect occurs at the out of band channels of the channelizer. In this paper rabbit ear problem and its reasons are analyzed, different methods based on both amplitude and frequency are proposed for detection and elimination of the rabbit ear effect. Proposed methods are tested at the center and at the edge of the channel for signals that have different pulse width. Suggested methods detected and eliminated most of the rabbit ear signals. This design which can be easily performed on real time signal processingsystems is implemented on FPGA board that samples in 2.5 GHz. Experimental results of the methods are presented.
The article reveals the reasons for the low efficiency of modern methods for detecting latent defects in the chips of super operative memory (further, memory chips) used in digital signal processingsystems. The first...
详细信息
ISBN:
(数字)9781728147727
ISBN:
(纸本)9781728147734
The article reveals the reasons for the low efficiency of modern methods for detecting latent defects in the chips of super operative memory (further, memory chips) used in digital signal processingsystems. The first reason is due to the constant decline in technological design standards. The second reason is that modern systems of functional testing the memory chips are not able to detect latent defects in the chips in real time. As a third reason, we can point out the insufficient effectiveness of modern “marching” tests, which are widely used for testing memory chips. In this paper, we propose a complex approach to organizing memory chips testing. The main idea this approach is supporting a close relationship is maintained between the mathematical and topological models of the tested chip. It is this connection that eliminates the first two of the above reasons for the low efficiency of memory chips testing methods. The hardware-software complex, that implements this approach, ensures the maintenance of a unified information environment based on the original hardware-oriented programming language STeeL. To eliminate the third reason mentioned above, a special component “Memory” was implemented as part of complex, which, unlike the well-known implementations, allows you to create functional tests of any complexity. This component implements the version of the “marching” test, which is a short dynamic memory test based on statistics from previous tests. The latter circumstance significantly reduces the total time spent on testing chips.
暂无评论